Kahoot review Flashcards

1
Q

NO Operation instructions that slide the program execution to the next memory address are known as

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__________ prevents senders from denying they sent the encrypted message.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A man in the middle attack, machine in the middle, monkey in the middle attack is when an _______________.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A hacker takes a device and hides malware within it hoping someone finds the device. This is best known as ____________.

A

Road apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ proves the contents of a message have not been changed since it was sent.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ sits behind a firewall, adding another layer of analysis, removing any risky content from the data flow.

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______ will show you the number of lines from the bottom of a file.

A

Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it when any access to information is granted to someone who shouldn’t have access to it, such as credentials.

A

Sensitive Data Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This vulnerability has been around since iOS7. Those in Bluetooth range could reprogram your iPhone.

A

AirDrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

______ happens when invalid data is sent to the application, intending to make it do something it shouldn’t.

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP is a protocol that enables network communications and translates IPv$ addresses to IPv6 addresses.

true/false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The OG PING utility created in 1983, was used by DARPA to test performance and was called the packet internet groper.

true / false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Comparable to a classic firewall; has a choke point router filtering inbound traffic; before the web server and the firewall.

A

Retina

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________ may make forecasting the address to where a program jumps undoable.

A

Stack randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__________ verifies the origin of the message.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Netcat functions as a back-end tool that allows data across a client and server once the connection is established.

true / false

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which rootkit infects your hard drive or system BIOS and may even be used to intercept disk-written data?

A

Hardware or Firmware Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NDP supplements several IPv4

A

Host Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

There are four categories of IDS. What are they?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

__________ is a device that monitors activity to identify questionable or even hostile events.

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NMap can do all but which of the following?

A

Transfer files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___________ will show you the first 3 lines of a file.

A

Head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Snort advantages include all of the following except:

A

It comes confgured for every 0 day attack out there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The ICC contains information about the owner, including the PIN and the PKI digital certificates.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A worm strained up to 50 million computers in 2007. What was its name?
Storm
26
Every Snort rule must have a SID. true/false
True
27
In this mode it reads packets off the network and displays them in a stream on your interface.
sniffer mode
28
The algorithm a node uses to map an IPv6 destination address to a neighbor IPv6 address.
Next hop determination
29
Which of the following is a PING command
-t PINGS the specified host until stopped
30
A shell script used to scan system binaries for rootkit alteration.
Chrootkit
31
Logs all packets to a disk, and can be useful for network traffic debugging.
Packet logger
32
Pings are mostly used when two hosts have no problem communicating with each other. true / false
false
33
An attack used for almost six years before it was found to be a common rootkit attack on Windows 10.
Zacinlo
34
Stateless firewalls use dynamic filtering. true / false
True
35
The two types of DNS queries are iterative and recursive. true / false
true
36
Which is not NOP-sled?
Jump sled
37
An attacker compromises a legitimate website knowing a victim will browse and allow them to breach their target device.
Drive-by download
38
Much like multi-byte sleds, its opcode can go straight to the shell code
Trampoline sleds
39
PKI certificates verify all of the following but which
Message decryption
40
Ports ___ to ____ are well known port numbers, designed for internet use.
0 to 1023
41
Netcat is a ___________ utility which reads and writes data across network connection...
UNIX
42
IPv6 vulnerabilities include all of which of the following
Bind TCP
43
A common technique to get through a locked door; simply follow someone opening a door and enter before it closes
Tailgating
44
Encryption provides the following: confidentiality, authentication integrity and non repidiotnstr true / false
True
45
Retina can scan
550 vulnerabilities
46
________ is the amount of time it takes from the release of a new patch to its full adoption among a fleet of mobile devices.
Vunerability window
47
All of the following are the modes of snort except:
HIPS (Host based intusion prevention system)
48
Who creates digital certificates and owns the poicies for verifying recipeoents
Certfication authorities
49
Which rootkit targets the core of your OS, changing how it functions?
Kernel mode rootkit
50
A command-line port scanner for all Windows Platforms
ScanLine
51
____ will return a certain word when parsing files
Grep
52
The graphical user interface aids you in the development of network visual mappings for better usability
Zenmap
53
The broad term used to cover a wide range of malicious activities accomplished through human interactions
social engineering
54
what command will print a list of all commands available to you in netcat
nc -help
55
DES, AES and Blowfish are all examples of what type of encryption.
Symmetric
56
You can schedule a run PING command as a future task.
True
57
__________ consists of 3 to 90 ros, each of which is like a small linear barcode
PDF417
58
CACs contain only abbreviated, selected data. This data is encryped using ____ encruption.
2048 bit
59
This cryptographic hash's main purpose is to ensure that files have not been altered; does so by using checksum.
MD5
60
__________ occurs when the volume of data exceeds the storage capacity of the memory buffer.
Buffer overflow
61
Some of the msot common reasons for network latency include DNS server errors, poorly optimized servers and low memory true/false
True
62
This is a cyber attack
IP spoofing
63
Slammer was _____________ bytes, about the length of a regular paragraph.
376
64
Which one of the following don't lie?
HIPS
65
The direction operators <> and --> indicate the direction of interest for traffic. true / false
true
66
Which rootkit hides in your computer's RAM?
Memory rootkit
67
Cryptcat is much like Netcat with what exception?
It allows encryption via twofish
68
This information may not be stored on a CAC
Personal medical information
69
A site infected with adware, taking advantage of a vulnerability in a user's web browser, delivers a
drive by download
70
According to GA law, computer trespass is when an actor uses a computer to alter, destroy, damage or disrupt true / false
true
71
The S2 calls, your access will be revoked unless further clearance related information is given. This is an example of:
Pretexting
72
Which rootkit replaces standard files in your computer, such as word or notepad?
application rootkit
73
In a ____, shell code "fastens" itself to a socket on a port and listens to see if it can establish a connection.
port bind
74
Snort rules can be written in a multi-line. This can be done by adding a backslash \ to the end of the line,
true
75
The two types of DNS servers are?
Recursor & Root
76
The size of an ICMP Echo request is ________.
77
What do you not have to consider...
How expensive will the IPS be?
78
This worm launched, and within 15 minutes, 27 million were without internet or cell service.
Slammer
79
Ensuring guest and old accounts are removed and everything is up to date prevents ___________
Security misconfiguration
80
Traffic will hit a border router, then a firewall, yet another firewall, and an inner router
Dual firewall setup
81
_____________ encodes the message's content
Confidentiality
82
What are the types of port binding for ports that receive messages
Specify now, specify later & direct
83
Snort supports all of the below IP protocols for suspicious behavior except for
ARP
84
___________ allow parts of an encryption to happen in hardware rather than software.
The AES extensions
85
How can you identify an ARP attack??
When two IP addresses share the same physical address
86
A ___________ is a small piece of software that piggybacks on real programs.
virus
87
Which encryption standard is the most common used, with a block size of 128 bits, can have 3 different key lengths
AES
88
Attackers are not able to conceal their network location by using "decoy traffic"
false
89
CAC keys are typically __ bits in length
256 bits
90
This vantage point gives the highest visibility while it eliminates any traffic that occurs between hosts:
Right behind the firewall